Uploaded as a courtesy by:
Dave Sweigert
In light of increasingly apparent, potentially catastrophic online threats to national security, experts from around the country and globe are emphasizing the government's need to act, and invest, accordingly.
This week, cross-disciplinary leaders in security research have come forward to urge the Trump administration to start fortifying U.S. cybersecurity before it's too late, starting with our key infrastructure. In a collaborative report by MIT’s Internet Policy Research Initiative at the Computer Science and Artificial Intelligence Laboratory (CSAIL) with the Center for International Studies, experts outlined a variety of steps and considerations for helping protect Americans on the digital front, where the cost of attacks has been soaring [PDF].
Based in part on a series of industry-led workshops exploring the concerns of various large U.S. firms, the report warns government that skimping on investment and innovation in cybersecurity for American infrastructure could be very costly business soon. “The nation will require a coordinated, multi-year effort to address deep strategic weaknesses in the architecture of critical systems, in how those systems are operated, and in the devices that connect to them,” the authors commented in in a press release. “But we must begin now. Our goal is action, both immediate and long-term.”
3. MIT Center for International Studies 3 MIT Internet Policy Research Initiative
Executive Summary and Recommendations
A History of Hesitancy
The digital systems that control critical infrastructure in the United States and most
other countries are easily penetrated and architecturally weak, and we have known it for a
long time. Yet Presidential leadership on infrastructure security has been hesitant and
chiefly rhetorical, while system operators have tended to focus on short-term fixes and
tactical improvements. Much effort has been devoted to developing better security
standards,1
but most standards are merely advisory. Key federal departments, notably but
not exclusively homeland security, defense, and energy have devoted significant effort to
improving infrastructure security. Examples would be too numerous to cite. But these
efforts have not altered the strategic balance.
Offense remains dominant. To break this cycle, the nation will require a
coordinated, multi-year effort to address deep strategic weaknesses in the architecture of
critical systems, in how those systems are operated, and in the devices that connect to
them. This effort must in part be technically directed, but it will also require a re-
evaluation of the laws, regulations, and policies that govern our networks. The challenges
we face are not merely technical. They are also economic, managerial, behavioral, political,
and legal. Indeed the technical challenges may be the easiest to address. For example,
aligning economic, tax, and liability incentives with the goal of higher security is not a
technical challenge. Re-aligning incentives would be a daunting task, but our critical
infrastructure cannot be made reasonably secure unless we do it.
This report identifies the most strategic of those challenges and proposes a policy
and research agenda that has the potential to achieve significantly higher levels of security
in critical networks over a five- to ten-year period. But the nation must begin now. Our
goal is action, both immediate and long-term.
To address this task, CIS and IPRI jointly convened a series of workshops focused on
four critical economic sectors, all of which are overwhelmingly or entirely in private hands:
electricity, finance, communications, and oil-and-natural gas (ONG). We did not set out to
write yet another description of the threat to our critical networks. In the wake of repeated,
widely reported foreign intrusions into our power grid and banking system and the recent
Russian interference in our national election, the threat is well known. Rather, we focused
1
See, e.g., National Institute for Standards and Technology, “NIST Releases Update to Cybersecurity
Framework,” January 10, 2017, at https://www.nist.gov/news-events/news/2017/01/nist-releases-
update-cybersecurity-framework, accessed February 9, 2017.
4. MIT Center for International Studies 4 MIT Internet Policy Research Initiative
on what to do about it.
The workshops were attended by experts2
from leading enterprises in each sector,
by academic experts in relevant fields, and by a few government officials. We expected
commonalities across all four sectors, and we found many. Participants in each sector
bemoaned the difficulty of quantifying network risk, for example; and each workshop
expressed great interest in techniques of containing cascading failure. But we also
encountered differences among sectors – in part because the sectors operate in different
regulatory frameworks, and in part because two of these sectors – electricity and oil-and-
natural-gas (ONG) – are heavily dependent on industrial operating technology (OT) as well
as information technology (IT). Significant differences also exist within sectors as well as
between them in their levels of investment in cybersecurity and ability to fend off attacks.
We have preserved the essence of the individual workshops in summaries at the back of
this report.
The Recommendations
This report makes both long- and short-term recommendations of broad
applicability to critical infrastructure in the United States and, excepting certain legal and
regulatory matters, to critical infrastructure globally. The report identifies eight strategic
challenges to illuminate our predicament and guide our policy and research. Under each
challenge, it makes findings that emerged from the workshops and recommendations to
address them. The recommendations cover a wide range of issues, from the organization of
cybersecurity in the Executive Office of the President to technical measures of network
security and misaligned regulatory incentives. Each of the challenges is then followed by a
series of research questions whose answers could help meet that challenge. The report
therefore addresses three audiences: government officials, public and private institutions
that fund research, and the researchers themselves. By changing and focusing the research
environment, IPRI and CIS believe the nation could materially improve our long-term
security environment. We emphasize the coordination of funding, however; we do not
propose budgetary measures.
2
Participants were free to use any information received, but neither the identity nor the affiliation of
any speaker or participant could be revealed. Industry participants came from ten private energy
companies in the United States, Canada, France, and the United Kingdom, including two of the oil
majors; four leading international banks, a major data processor for financial institutions, and a leading
securities clearing organization; two tier-one communications providers; a leading computer chip
manufacturer; a leading maker of commercial and consumer software; and representatives of the
Government of Canada, the U.S. departments of homeland security and energy, and the Office of the
Governor of Massachusetts. Participants from firms and governments in India and from another U.S.
university were invited but did not attend. The views expressed in this report do not necessarily reflect
those of individual workshop participants or of their enterprises and agencies.
6. MIT Center for International Studies 6 MIT Internet Policy Research Initiative
FINDINGS AND RECOMMENDATIONS
FIRST CHALLENGE
Improve Coordination.
Finding:
Critical infrastructure defense is insufficiently coordinated across the
government. Changing the status quo will require a more directive effort
from the White House.
Recommendation:
The President should elevate his cybersecurity advisor to the position of
deputy national security advisor for cybersecurity. That official should be
directed and empowered to work with the Office of Management and
Budget (OMB) to focus long-term policy across the government on the
substantive challenges identified below and to produce on an accelerated
schedule a federal research agenda and budget for the cybersecurity of
critical infrastructure focused on these same challenges. OMB should
determine that funds are spent accordingly.
SECOND CHALLENGE
Measure cyber risk and infrastructure fragility.
Finding:
Quantifying risk in either absolute or relative terms is a difficult challenge
that impedes cybersecurity investment in all sectors examined except
certain financial institutions. The asserted inability to measure the rate of
return on cybersecurity investment is a closely related problem3
that
affects overall investment levels and makes it difficult to target investment.
Fragility of systems is a salient aspect of risk that concerned participants in
all sectors. Absent assurances of confidentiality, candid participation by the
private sector will not occur. However, the public should be informed of
the general state of security of critical infrastructure.
3
Most participants accepted the view that cyber risk, changes in cyber risk resulting from a specific
security investment, and the rate of return on that kind of investment could not be measured. For the
contrary view, see Douglas W. Hubbard and Richard Seiersen, How to Measure Anything in
Cybersecurity Risk (New York, 2016).
7. MIT Center for International Studies 7 MIT Internet Policy Research Initiative
Recommendation:
The President should direct the lead departmental secretary to convene
on an accelerated schedule a meeting of representatives of the relevant
national laboratories and other experts to assess impediments to
measuring cyber risk and fragility and to recommend a national strategy
to meet this challenge. The meeting should be closed to the public and its
proceedings, though not the strategy, should be kept confidential.
Research Questions:
1. Can cyber risk or network fragility be measured? Can changes in risk as the result
of specific security investments be measured? If so, why are enterprises not doing
it?
2. Would the answers to these questions produce more rational decision-making by
enterprises? If not, why not?
3. Can simulation-based modeling be used to create cybersecurity stress-tests for
critical sectors? In the electricity sector, could that type of modeling be used to
test the ability to “cold start” electricity generation? Can the results of such
modeling be protected from public disclosure? How, and at what level of
generality, should the public be informed of vulnerabilities in critical systems?
4. Should the answers to these questions have regulatory implications for some or all
critical sectors?
5. Can the necessary de-identified4
data be obtained to support research into these
questions? Would legislation be appropriate to compel the production of that de-
identified data in the interest of national security – but with an exemption from
disclosure and under a legal privilege that would prevent its use for any other
purpose?5
How would the required data be defined, and who should hold it?
4
De-identification means removing identifying aspects of data so that, practically speaking, it would be
difficult and expensive to re-associate it with a particular person. Perfect anonymization of data is not
possible in most circumstances.
5
The National Infrastructure Protection Act, codified as 42 U.S.C. §§ 5195c et seq., does not clearly
give the Department of Homeland Security power to require production of specific categories of data
from private firms. See 42 U.S.C. § 5195c (d)(2)(A) and (B).
8. MIT Center for International Studies 8 MIT Internet Policy Research Initiative
THIRD CHALLENGE
Review laws and regulations with the goals of reducing risk and optimizing security
investment.
Finding:
Participants from all sectors overwhelmingly believed there was a material
disconnection between mandatory compliance regimes and improvements
in cybersecurity. Most participants from all sectors except finance believed
that federal tax and regulatory incentives for higher levels of cybersecurity
investment should be considered. Many participants from the electricity
and telecommunications sectors believed that regulations either impeded
or did not encourage higher levels of cybersecurity investment.
Recommendations:
The President should propose legislation at the earliest opportunity for
the more favorable tax treatment of qualified cybersecurity investment in
critical infrastructure and, potentially, throughout the economy, including
investment necessary to convert to a more secure DNS and to more
secure border gateway protocols. To qualify for favorable treatment,
investments should be in products and services that are demonstrably
compliant with the framework promulgated by the National Institute for
Standards and Technology (NIST).6
The secretary of energy, state public utility commissioners, and the
National Association of Regulated Utility Commissioners should forthwith
examine the effect of utility regulation on cybersecurity with particular
attention to (i) the effect of current regulations on cybersecurity
investment and (ii) the usefulness of current compliance standards in
achieving higher levels of security.
6
National Institute for Standards and Technology, “Framework for Improving Critical Infrastructure
Cybersecurity,” version 1.0, February 12, 2014, at
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf, accessed February 20, 2017. For draft version 1.1 of the Framework, see
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf, accessed February 20, 2017.
9. MIT Center for International Studies 9 MIT Internet Policy Research Initiative
Research Questions:
1. How should liability rules and regulations be optimized to produce more secure
behavior by vendors and by the owners and operators of infrastructure? A
comparative study of state as well as federal regulatory models would be useful in
addressing this question.
2. Can cybersecurity regulation be harmonized across government? Government
regulates by sector. For example, the Federal Communications Commission
regulates telecommunications; the Treasury Department, the Federal Reserve, and
other agencies regulate banks; the Energy Department, the Environmental
Protection Agency, and the states regulate energy, and so on. But as these
“vertical” regulators have also begun to regulate cybersecurity, a complex of
overlapping, expensive, and potentially inconsistent standards is emerging. Are
these regulations driving greater security, or are they merely more elaborate and
expensive compliance regimes?
3. The many competing compliance standards create confusion. Should the
government make the NIST Framework, and only the NIST Framework, a single
mandatory standard across government and for contractors dealing with the
government?
4. Could the financial impact on insurers and re-insurers of the damage resulting
from a successful attack on one or more critical sectors be absorbed by them? If
not, what law and policy would be required to make it likely that such losses could
be absorbed?
5. Can the necessary, de-identified data be obtained to support research into these
questions? If not, would legislation be appropriate to compel the production of
that de-identified data in any sector while protecting the rights of the enterprises
that would produce the data? How would the required data be defined?
FOURTH CHALLENGE
Enable critical infrastructure operators to quickly identify and respond to
cyber risk arising from cross-sector linkages as well as from their own networks.
Finding:
All sectors depend on electricity, and the financial sector’s global platform
supports transactions with energy and telecommunications. These and
other linkages create possibilities for cascading failure that are
insufficiently understood and not adequately illuminated by sector-specific
10. MIT Center for International Studies 10 MIT Internet Policy Research Initiative
simulations and other testing. Participants from all sectors stated
emphatically that cooperation on pooling proprietary data and candor
regarding the results of testing could not be achieved unless parties could
be assured that the data and results would remain confidential and could
not be used for other purposes.
Recommendation:
The President should direct the lead departmental secretary to convene
on an accelerated schedule a meeting of representatives of the nation’s
leading industrial insurers and other experts to examine the steps
necessary to enable more robust cross-sector simulations, including the
sharing of data, and to make appropriate recommendations to the
President. The meeting should be closed to the public and its proceedings
kept confidential, but the resulting recommendations should be public.
Research Questions:
1. What steps would increase the likelihood of early detection of a slow-moving
strategic attack on a critical sector or across critical sectors? How will detection
techniques be affected by the anticipated move to IPv6?7
2. How would such an attack affect critical backup systems?
3. Can simulation-based modeling be used to create better cross-sector stress tests?
4. Can simulated cyber disasters help determine how communications should be
prioritized in the event of a national emergency?
5. Can efforts to use big data and fast processing to quickly detect intrusions in
critical networks be accelerated?
6. What, if anything, prevents the effective use of identity management tools across
the full range of steps necessary to execute a successful exploit or attack?
7
IPv6 is an Internet addressing protocol that would expand the number of IP addresses available under
the current protocol, called IPv4, by a factor of 7.9 x 1028
. It could therefore render ineffective current
techniques for scanning systems for malware because the address space to be scanned would be
exponentially larger.
11. MIT Center for International Studies 11 MIT Internet Policy Research Initiative
FIFTH CHALLENGE
Reduce component complexity and the vulnerabilities inherent in them.
Finding:
Participants from the electricity and energy and oil-and-natural gas (ONG)
sectors believed that unduly complex, and insufficiently secure, hardware,
software, and industrial controls were a significant source of cyber
vulnerabilities that created physical danger as well as risk to information.
Participants from the ONG sector were emphatic on this point. Both energy
sectors are highly dependent on industrial operating technology. This is a
significant supply chain risk created by commercial, not technological,
factors. Suppliers find it profitable to market cheap, general purpose
hardware and software for multiple uses, regardless of differing security
tolerations in different sectors and uses.
Recommendation:
The President should direct the lead departmental secretary to report to
him on an accelerated schedule on the feasibility, timeline, and expense
of supporting and otherwise incentivizing the production and use of more
secure and less complex hardware, software, and controls for use in
critical infrastructure.
Research Questions:
1. Can the technical, economic, and regulatory obstacles to reducing complexity in
both information technology and industrial operating technology be identified?
2. Field programmable gate arrays (multipurpose computer chips) are cheap, so they
are used for many purposes including commercial routers and industrial controls
used in critical infrastructure operations, but their complexity and superfluous
functionality increase risk. The same may be said of general purpose processing
units, operating systems, and software systems.
a. Can standards be established to reduce the vulnerabilities in logic processors
and the software and firmware that control them?
b. Can standards be established, or incentives created, to phase out design tools
that permit hardware and software designers to make the same basic errors
repeatedly, such as allowing buffer overflows?
12. MIT Center for International Studies 12 MIT Internet Policy Research Initiative
c. What steps would be necessary to establish a certification system for hardware
and software, possibly modeled on the Underwriters Laboratory for electrical
products?
d. Can microchips be designed so that entire sectors of those chips can be
cheaply, reliably, and verifiably disabled so that functionality matches task
requirements?
3. What incentives should be in place to induce controls manufacturers and Internet
service providers to use less vulnerable chips?
4. Are the departments of defense, energy, and homeland security optimizing their
role in creating and supporting a market for simpler and more secure commercial
devices in critical infrastructure? For example, can these departments jointly
establish metrics for complexity and standards for controls, and use their
procurement decisions to favor less complex and more secure hardware and
software?
5. Can simpler firmware and operating systems be cost-effectively developed and
marketed for use in critical infrastructure?
Sixth Challenge
Address fundamental issues of system architecture.
Findings:
1. The Internet is a legacy system designed for non-commercial uses with
little or no need for security. Security has chiefly been an option for end
points, which frequently ignore it in favor of speed-to-market and low
costs. Hardware and software that run on the Internet display wide
differences in security, and the tools for creating hardware and software
enable many of the same security errors to be repeated over many years,
without liability.
2. Security professionals from all sectors overwhelmingly believed that
certain aspects of their systems could not otherwise be made reasonably
secure unless isolated from public networks. There are significant
differences of opinion about appropriate degrees of isolation.
13. MIT Center for International Studies 13 MIT Internet Policy Research Initiative
Recommendations:
1. The President should direct the secretaries of energy and homeland
security:
a. in consultation with the Federal Energy Regulatory Commission (FERC), to
explore the feasibility, expense, and timelines of isolating from public
networks8
all controls and operations of activities within FERC’s
jurisdiction,9
to define acceptable degrees of isolation, and to report to
the President on an accelerated schedule; an
b. in coordination with the FERC and the North American Electric Reliability
Corporation (NERC),10
to convene at the earliest practical time a
conference of state electricity regulators to explore the feasibility and
expense of isolating key elements of electricity generation and delivery
from public networks.
2. The President should direct the lead departmental secretary to consult
with key stakeholders, including vendors, users, the public, and the
insurance industry, about the desirability and feasibility of (i)
establishing legally binding standards of care in the manufacture of
hardware and software for critical infrastructure, and (ii) the
establishment of a privately owned and managed accreditation bureau
for such hardware and software, and to report to the President on an
accelerated schedule.
Research Questions:
1. Should some operations of some or all critical sectors be isolated from the
Internet? If so, which ones? How should “isolation” be defined? What level of
isolation would be appropriate for particular systems in critical applications? Who
should determine that?
8
This is not a recommendation to create a single non-public energy network. Isolation from public
networks does not imply isolation from efficient, digital operating systems that produce real-time, or
near real-time, information about those systems. Non-public information and operating systems based
on TCP/IP protocols are available or can be created.
9
FERC has jurisdiction over the interstate transmission of electric power. Power generation and
delivery are regulated by the states and territories.
10
NERC is composed of the owners and operators of the grid and has been named by FERC as the
“Electric Reliability Organization.” It is charged by Congress to “establish and enforce reliability
standards for the bulk-power system,” subject to FERC’s oversight.
14. MIT Center for International Studies 14 MIT Internet Policy Research Initiative
2. Can block chain or other technology be used to verify accounts in a timely fashion
to reduce the risk of corrupted backup systems and wiped accounts?
3. What changes to security architectures would let us more efficiently manage
system accesses and identities for devices, people, applications, and data, both
internally and externally?
4. Can a system be designed so that its failure would be immediately transparent to
its operator? Can the state of the system’s algorithms be made understandable to
humans? Would it be cost-effective to impose audit requirements on that kind of
system? (E.g., if a driverless car ran off a bridge, could its control algorithm be
made to explain why it did that?) If so, why don’t we mandate that kind of
auditability in critical sectors?
5. What economic, regulatory, or other factors impede the more rapid phasing out of
legacy components of electronic systems in favor of components that are not
merely newer but are demonstrably more secure?
6. What economic or other factors impede the adoption in the private sector of the
existing but largely unused secure domain name system or an alternative security
architecture? What incentives could accelerate the adoption of a more secure
domain name system?
7. In the communications sector, what economic or other factors impede the
adoption of secure border gateway protocols that would make it impossible, or
substantially more difficult, to divert network traffic? What incentives could
accelerate the adoption of that type of control?
8. Companies have differing interests. Academics make a living by disagreeing with
one another and often prefer the notional perfect to the achievable good. Universal
agreement on a domain name system and border gateway controls is therefore not
achievable. Is there a point, short of war, when the Congress should make these
choices?
9. The Internet of Things makes attack surface management geometrically more
difficult. What aspects of insecure devices matter most in this respect? Should
enhanced security be applied at the device level or only at higher levels within
networks?
10. Would it be feasible and efficient in a virtual network to segregate or at least
identify all executable code, thus making unauthorized executables more readily
discoverable?
15. MIT Center for International Studies 15 MIT Internet Policy Research Initiative
SEVENTH CHALLENGE
Formulate an effective deterrence strategy for the nation.
Findings:
The cybersecurity postures and capabilities of the United States and its
peer or near-peer competitors in cyberspace have served to deter outright
attacks against one another’s critical infrastructure, but have been
unsuccessful in deterring lower-level but increasingly harmful cyber
operations across our economy, society, and political system. Hostile acts
are systematically carried out below the level of armed conflict that have
the potential to gradually reduce this nation’s stature and security and its
ability to lead free and open democracies around the globe. In this gray
space between war and peace, the United States does not have an
effective deterrence strategy against either nation-states or transnational
groups bent on terror or other forms of disruption of our critical
infrastructure.
Recommendation:
The President should direct his national security advisor to review the nation’s
deterrence strategy. That strategy should include, but not be limited to, (i)
hardening critical American systems and infrastructure; (ii) raising the price
for attacking them; (iii) constructing a diplomatic strategy for achieving
verifiable cybersecurity agreements with potential adversaries; and (iv)
evaluating the nation’s ability in the long term to maintain offensive
dominance in cyberspace and the stabilizing or destabilizing effect of
attempting to do so.
Research Questions:
1. In view of the demonstrated ability of certain nation-states to exploit critical
networks for economic, political, and potentially military advantage, would a more
directive policy toward hardening critical networks be justified? Would that course
of action be politically acceptable in the United States and among other nations
involved in global transactions and telecommunications?
2. Cyber network operations by capable nation-states and their proxies are difficult or
impossible to prevent, yet we expect critical infrastructure operators to defend
themselves against these attacks. Is this the right public policy? If not, what policy
should replace it?
16. MIT Center for International Studies 16 MIT Internet Policy Research Initiative
3. Will the pursuit of offensive dominance in cyberspace continue to be feasible in the
next five to ten years? Will its pursuit be inconsistent with order and stability in
cyberspace, as it proved to be in the strategic nuclear relationship with the Soviet
Union? What are the implications of the answers to these questions for American
diplomatic strategy in cyberspace?
Is the President receiving robust counter-strike options, both military and non-
military, for cyber intrusions, including those that do not rise to the level of
armed conflict under international law?
4. Is any department of government conducting realistic simulations and other
exercises to explore the consequences of non-military counter-strikes in response to
a cyberattack? Does the President’s understand and approve of the assumptions
that underlie these exercises?
EIGHTH CHALLENGE
Accelerate and improve the training of cybersecurity professionals.
Findings:
There is a serious dearth of cybersecurity expertise in the United States,
especially at advanced levels. The nation does not produce enough
graduates with advanced cybersecurity skills or with skills in both
cybersecurity and in the operation of industrial operating systems.
Recommendation:
The President should appoint a blue-ribbon commission on the
feasibility of increasing the supply of highly trained computer scientists
and engineers and developing model curricula for training computer
scientists and engineers in the defense of critical systems. The
commission should report to the President within 180 days.
17. MIT Center for International Studies 17 MIT Internet Policy Research Initiative
This is a time for action. It is also a time for calm, long-term strategic
thinking, based on sound research, into the underlying causes of cyber
insecurity and how to address them.
Research Questions:
1. Adm. Hyman Rickover created a rigorous model for selecting and training nuclear
submariners. Should government or industry adopt his model for the cyber
defense of critical infrastructure?
2. Can effective network defense skills be taught without also teaching high-level
offensive skills? If not, given the risk of teaching those skills to a wider cadre, who
should be eligible to receive that instruction? Should qualified trainers, in defined
circumstances, be granted liability protection for teaching offensive tactics?
3. Are different core curricula appropriate to train people to operate and defend the
networks of different critical infrastructures? If so, who should develop them?
4. Should people in cybersecurity disciplines be subject to specialized training and
certifications, as in other professional disciplines?
Background:
The Persistent Problem
In the United States, Presidential Directives to address infrastructure risk have
emerged from the White House like clockwork for more than twenty-five years. In 1990,
President George H.W. Bush announced to the country what intelligence officials, but not
many others, already understood: “Telecommunications and information processing
systems are highly susceptible to interception, unauthorized electronic access, and
related forms of technical exploitation, as well as other dimensions of the foreign
intelligence threat. . . . “
In 1998, as enterprises were beginning to shift both information systems and
operations to the Internet, President Clinton warned of the insecurities created by cyber-
based systems. In 1998 he directed that “no later than five years from today the United
States shall have achieved and shall maintain the ability to protect the nation’s critical
infrastructures from intentional acts that would significantly diminish” our security. Five
years later would have been 2003.
18. MIT Center for International Studies 18 MIT Internet Policy Research Initiative
In 2003, President George W. Bush implicitly recognized that this goal had not
been met. He stated that his cybersecurity objectives were to “[p]revent cyber attacks
against America’s critical infrastructure; [r]educe national vulnerability to cyber attacks;
and [m]inimize damage and recovery time from cyber attacks that do occur.” Meanwhile,
virtually all commercial and operational activity was migrating to the Internet, which
remained insecure.
By 2009, concerns about critical infrastructure had become acute. President
Obama said:
The architecture of the Nation’s digital infrastructure, based
largely on the Internet, is not secure or resilient. Without major
advances in the security of these systems or significant change in
how they are constructed or operated, it is doubtful that the
United States can protect itself from the growing threat ….
By 2013 – fifteen years after President Clinton had said the country’s critical
infrastructure should be secure from malicious disruption by 2003 -- President Obama
acknowledged that the goal had not been met: “The cyber threat to critical infrastructure
continues to grow and represents one of the most serious national security challenges we
must confront.” The view at the enterprise level is much the same. Trend Micro, a leading
Internet security firm, reported in 2015 that critical infrastructure operators throughout
the Western hemisphere “painted a picture that depicts the threat [to their networks] as
being severe, while some perceived the future of securing these infrastructures as bleak.”
The question the nation faces is therefore this: Are we condemned to remain in
this unstable and insecure condition, in which the best we can do is to repeat urgent but
futile warnings from high places and, at the operational level, merely to refine our tactics
in a losing game of Whac-A-Mole? To find an answer, we gathered experts from industry,
government, and academia, to imagine – in President Obama’s phrase – “a significant
change in how [systems] are constructed or operated.” This meant going beyond the
intense and difficult day-to-day tactical challenges that critical sector operators face,
important as they are, to imagine a better security environment in five to ten years and to
understand what keeps us from getting there.
Expanding Operational Risk
For the owners and operators of critical infrastructure, the prime concern is risk to
continuity of operations rather than theft of information, though that, too, is a serious
risk. An intruder who can steal massive amounts of data from a system remotely can also
corrupt the information on the system, or wipe information from it, or shut it down.
19. MIT Center for International Studies 19 MIT Internet Policy Research Initiative
Information technology and industrial operating technology have largely converged. A
decade ago, researchers at the Idaho National Laboratory proved they could physically
destroy a diesel-electric generator using only a keyboard and a mouse.11
Real-world
examples soon followed.
In 2010, the centrifuges used to enrich uranium gas at Iran’s Natanz nuclear facility
started failing rapidly. The Iranians were baffled – until researchers in Germany diagnosed
the Stuxnet virus, now widely attributed to the intelligence services of the United States
and Israel.12
In 2012, cyber attacks from Iran wiped all information from thirty thousand
computers at the world’s largest oil refiner, Saudi Aramco.13
In 2014, an unidentified
intruder used a spear-phishing ruse to gain access to the network of a German steel mill,
then caused multiple components of the industrial control system to fail, resulting in
massive physical damage.14
Meanwhile, starting in 2011, a Russian operation known as
“Dragonfly/Energetic Bear” began targeting North American aviation companies before
shifting to U.S. and European energy firms. Its targets included “energy grid operators,
major electricity generation firms, petroleum pipeline operators, and Energy industry
industrial control system (ICS) equipment manufacturers. Most of the victims were in the
United States, Spain, France, Italy, Germany, Turkey, and Poland.”15
There were no
reports of damage from these penetrations; they appeared to be reconnoitering exercises
that could facilitate damaging attacks on the systems later, if the intruder chose to attack.
In 2015 the prospect that an attacker might launch a damaging attack on an adversary’s
energy grid became reality when portions of Ukraine’s power grid were disabled for
several hours in a coordinated attack on three energy firms. This was the first publicly
acknowledged attack on a power grid. The Ukraine government immediately blamed
Russia. The attackers employed a range of sophisticated tools, but in the view of several
analysts, “the strongest capability of the attackers was not in their choice of tools or in
their expertise, but in their capability to perform long-term reconnaissance operations
required to learn the environment and execute a highly synchronized, multistage,
multisite attack.”16
11
“The experiment used a computer program to rapidly open and close a diesel generator's circuit
breakers out of phase from the rest of the grid and cause it to explode.” Wikipedia, “Aurora Generator
Test,” at https://en.wikipedia.org/wiki/Aurora_Generator_Test, accessed January 6, 2017.
12
Wikipedia, “Stuxnet,” at https://en.wikipedia.org/wiki/Stuxnet, accessed November 16, 2016.
13
Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,” New York Times, October
23, 2012, at http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-
disquiets-us.html, accessed December 23, 2016.
14
R.M. Lee et al., “German Steel Mill Attack,” SANS Institute, ICS Defense Use Case, December 30,
2014, at https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf, accessed
December 23, 2016.
15
June 30, 2014, at https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-
under-sabotage-threat, accessed December 6, 2016.
16
Lee et al., “Analysis of the Cyberattck on the Ukrainian Power Grid,” SANS Institute, ICS Defense Use
Case, March 18, 2016, at http://www.nerc.com/pa/CI/ESISAC/Documents/E-
ISAC_SANS_Ukraine_DUC_18Mar2016.pdf, accessed December 23, 2016.
20. MIT Center for International Studies 20 MIT Internet Policy Research Initiative
This is the offense-dominant environment that critical infrastructure operators
now live in. Network defense has certainly gotten better in the last fifteen years in
absolute terms, but so has the offense. Relative to the increased resources and
sophistication of criminal and nation-state attackers, it is doubtful the defense has
improved at all. Attacks are still easy and cheap to launch and difficult and expensive to
defend against.
The offense continues to enjoy inherent advantages owing to human fallibility,
architectural flaws in the Internet and the devices connected to it, massive data
aggregation, and pervasive interconnectivity. And the attacker must succeed only once,
while the defense must succeed thousands or millions of times. Connecting geographically
dispersed operating equipment to the Internet has brought undoubted efficiencies to
electricity generators and other industries, but it has also created dangerous
vulnerabilities in the systems that keep the lights on and power the economy. In late
2016, the recently retired chief security officer of AT&T said it was “inevitable that
significant, large-scale cyber attacks will be launched against our critical infrastructure [in
the coming four years]. These attacks will shift from the theft of intellectual property to
destructive attacks aimed at disrupting our ability to live as free American citizens. I do
not know of a single cyber security expert in our country who would disagree with this
view.”17
We concur.
Why Are Systems Insecure?
When the Internet was being designed in the early 1970s, it was not initially clear
what the important security issues were. Its initial purposes were to assure
communications in the event of a nuclear attack through packet-switched routing, and
then to serve as the basis for collaboration among geographically dispersed scientists
working for the Department of Defense. The relatively few people having access to the
original network were a trusted group for whom security was not an issue. Insofar as the
network’s sponsors in the Department of Defense and the intelligence community
thought about security, they preferred that security challenges be pushed onto the
attached end-nodes, without appreciating the difficulty of doing so. The Internet’s
designers understood that many security problems would best be addressed through
encryption, but encryption was not a commercially practical technology at the time for
reasons of performance and lack of open standards. At the time, encryption was also
regulated as a munition for export purposes. These considerations, together with the
imperative to get the Internet to work at all, led to several classes of security problems. In
particular:
17
Edward Amoroso, “An Open Letter to the President-Elect on Cyber Security,” LinkedIn, November
25, 2016, at https://www.linkedin.com/pulse/open-letter-president-elect-cyber-security-edward-
amoroso, accessed December 10, 2016.
21. MIT Center for International Studies 21 MIT Internet Policy Research Initiative
1. Several of the core control protocols and supporting services of the Internet were
designed without an approach to security, and adding security after the fact has
proved more difficult than anticipated. These protocols include the global, inter-
domain routing protocol (Border Gateway Protocol or BGP), the Domain Name
System (DNS),18
and the Certificate Authority system. In all these cases, secure
alternatives have been proposed but have not been taken up in the marketplace.
What the original designers thought would be a technical challenge has turned out
in all cases to be a challenge created by misaligned economic incentives, poor
coordination and leadership, a lack of global trust among stakeholders, and
disagreements about what the security problems are.
2. Strictly speaking, the Internet is simply the network that connects end-points using
a technical protocol called “TCP/IP.”19
It was never meant to police itself for
criminal or offensive behavior. To a significant degree, therefore, the Internet is
doing what it was designed to do: that is, to connect end-points. Many (perhaps
most) of the vulnerabilities in our systems occur at other levels – in hardware
designed with little or no consideration for basic security, for example;20
in
carelessly written software;21
and in applications created for quick market
penetration that are unable to meet reasonable security requirements.22
In the
early days of the Internet’s development, the designers paid relatively little
attention to the challenge of developing secure applications, since in their view
they had no control over what application designers could do. Most application
designers today are motivated by features, time to market, and return on
investment. These priorities align poorly with security. This set of actors is highly
diverse, unregulated, transnational, and sometimes hard to find, and it is not clear
what approach could be used to nudge them to attend more to security.
18
“Domain Name System,” Wikipedia, at https://en.wikipedia.org/wiki/Domain_Name_System,
accessed December 12, 2016.
19
For definitions of the Internet and TCP/IP protocols, see respectively Wikipedia at “Internet,”
https://en.wikipedia.org/wiki/Internet, and “Internet Protocol Suite,”
https://en.wikipedia.org/wiki/Internet_protocol_suite, both accessed January 7, 2017.
20
For the IoT attack on an important Internet company, see Schneier on Security blog, “Lessons from
the Dynamics’s DDoS Attack,”
https://www.schneier.com/blog/archives/2016/11/lessons_from_th_5.html; James Scott and Drew
Spaniel, Rise of the Machines: The Dynamics’s Attack Was Just a Practice Run, December 2016,
Institute for Critical Infrastructure Technology report, at http://icitech.org/wp-
content/uploads/2016/12/ICIT-Brief-Rise-of-the-Machines.pdf, accessed January 8, 2017.
21
See, e.g., Wikipedia, “Buffer Overflows,” at https://en.wikipedia.org/wiki/Buffer_overflow, accessed
January 3, 2017. Buffer overflows have been known to be a security vulnerability for years.
22
See, e.g., Lucian Constantin, “App Developers Not Ready for Stricter IoS Security Requirements,”
Computerworld, December 6, 2016, at www.computerworld.com/article/3147373/security/app-
developers-not-ready-for-stricter-ios-security-requirements.html, accessed December 7, 2016.
22. MIT Center for International Studies 22 MIT Internet Policy Research Initiative
3. There is no agreement today on who, if anyone, should be responsible for making
the Internet ecosystem more secure. For example, it can be extremely difficult,
even impossible, to be certain who you are communicating with on the Internet.
Identities can be easily spoofed and websites counterfeited, enabling fraud. But
which actors in the Internet ecosystem should undertake to fix this? Should the
packet-forwarding layer of the Internet attempt to impose a single, global identity
scheme that applies to all applications? Doing so would raise yet again the
question of global trust and coordination. It would make anonymous action very
difficult. That would reduce crime, but it would also enhance surveillance powers
and thereby threaten privacy. Should the large and uncoordinated community of
application designers be told that identity assurance is their problem? In fact, the
solution probably requires support at all layers. But there is no institutional forum
in which an allocation of responsibility can be resolved.
4. Data files, which are passive, and executable files, which perform operations on
data, cannot be distinguished as they are transmitted across the Internet. But this
approach left the discrimination between data and executable files to the
application designers in the end-nodes, who were often indifferent to the issue. As
a result, malicious executables are easily disguised among large quantities of data.
They are easy to insert and extremely difficult to find in a large database or
system. This problem became much more difficult once data files (e.g., a Word
file) were designed to embed executable code (e.g., macros).
After Congress made the Internet generally available for commercial use in 1992,
the network became the backbone of our entire system of economic and social
communication, and increasingly of our physical operations, so these inherent
weaknesses assumed enormous significance. As Richard Danzig has noted, “Cyber systems
create serious security problems because they concentrate information and control and
because the complexity, communicative power and interactive capabilities that enable
them unavoidably create vulnerabilities.”23
Putting massive amounts of information in
one place, which is highly efficient, also facilitates massively efficient theft. And
connecting almost everything to almost everything else, which is also efficient, means
that a vulnerability in any part of the interconnected system is a vulnerability in every part
of it. These factors, together with the difficulty of tracing and attributing attacks, make
the Internet a prime environment for criminals.
23
Richard Danzig, “Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of
America’s Cyber Dependencies,” Center for a New American Security (July 2014), p. 9, at
https://www.cnas.org/publications/reports/surviving-on-a-diet-of-poisoned-fruit-reducing-the-
national-security-risks-of-americas-cyber-dependencies, accessed December 24, 2016.
23. MIT Center for International Studies 23 MIT Internet Policy Research Initiative
It is a serious error to assume that cybersecurity is entirely a matter of technical
specifications and system design. Poor business management, lack of clear responsibility
within organizations, and bad user behavior would continue to create significant
vulnerabilities even if the technical issues could suddenly be fixed. Last year, when for the
first time the Bank of England included cybersecurity as a major risk factor for the
financial stability of the United Kingdom, its number one finding was, “Overemphasis on
technological (as opposed to management, behavioural and cultural) aspects weakens
cyber defensive capabilities.”24
We concur.
A common human error enabling fraud is susceptibility to an online scam known
as phishing. Phishing involves sending a mass email that appears to come from a trusted
source such as a bank or a well-known company, but does not. A recipient (the “phish”)
who opens the email and clicks on the attachment unwittingly downloads malware. The
purpose of the malware varies. It may steal information such as passwords or credentials,
or it may enlist the recipient’s machine in a campaign to advertise pornography, drugs,
etc. Phishing campaigns are nearly cost-free to conduct and are highly successful.
According to Verizon, thirty percent of recipients open phishing emails, and about a third
of them click on the attachment. “The median time for the first user of a phishing
campaign to open the malicious email [was] 1 minute, 40 seconds. The median time to
the first click on the attachment was 3 minutes, 45 seconds ….”25
Spear phishing is a socially engineered fraud aimed at a specific person, often a
corporate or government official. This is a favorite tactic of sophisticated criminal gangs
and intelligence services, which can craft an email that appears to come from a trusted
person on a topic that the recipient is known to be interested in. Sometimes the malware
is automatically downloaded merely by opening the email. In a recent survey by Trend
Micro, “spear-phishing tactics were cited by all responding members as the single biggest
attack method they had to defend against, with the exploitation of unpatched vendor
software vulnerabilities being a distant second.” Whether an effective technological
defense to this vulnerability can be deployed remains to be seen.
Weaknesses in the email system also contribute to identity spoofing. The basic
design of email is older than the Internet; it existed in the late 1960s in an earlier internal
Defense Department network called ARPAnet. There seemed to be little need in those
days to build an authenticated identity system to validate the sender of an email on a
closed system involving trusted parties. Since that time, there have been proposals put
forward to secure email by having the sender sign the mail in a trustworthy manner, but
those proposals achieved little market traction owing to lack of market demand,
24
Bank of England, “Financial Stability Report,” July 2015, Table A.10, p. 32, at
http://www.bankofengland.co.uk/publications/Documents/fsr/2015/fsrfull1507.pdf, accessed January
6, 2017.
25
Verizon, “2016 Data Breach Investigations Report,” p. 18, available at
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/, accessed December 24, 2016.
24. MIT Center for International Studies 24 MIT Internet Policy Research Initiative
engineering complexity, development costs, disagreements about the correct approach,
the lack of an institution that could exercise acceptable global leadership, and so on.
There would also be little if any market advantage to incurring these costs if others failed
to follow. These issues are not technical.
The vulnerabilities at all levels of the cyber environment have been well known for
years, yet many firms fail to take basic security precautions. And it is still the case that a
large majority of intrusions are discovered by law enforcement and other third parties
and not by the enterprise that owns the network.26
Even among owners and operators of
critical infrastructure, decisions to expose their operations to these vulnerabilities have
repeatedly been made with little or no regard for the risks thus imposed on the
enterprise, let alone the risks imposed across the entire economy. Enterprises that expose
their operations to the Internet must accept Internet services as they find them, replete
with vulnerabilities, and protect themselves accordingly. Insofar as those enterprises are
regulated, the cost of doing so should be reflected in the rates they are permitted to
charge.
In short, profound network insecurity has persisted for twenty-five years for many
reasons. A problem this enduring in so fundamental an area demands concerted
attention. It also calls for concentrating resources devoted to research and development
efforts (R&D) into technologies and policies to make attacks more difficult and expensive
to launch and less difficult and expensive to combat.
Coordinating Research Policy
There has been no shortage in recent years of federal pleas for research into
critical infrastructure cybersecurity, but they have tended to remain general and
hortatory. In 2009, for example, the Department of Homeland Security (DHS) published “A
Roadmap for Cybersecurity Research” that identified an important problem set but did
not develop a research agenda to deal with it. In 2011, the National Science and
Technology Council (NSTC) articulated the need for federal spending in basic cybersecurity
research but was content to describe challenge areas (e.g., mobile security, creation of
trusted spaces, etc.) rather than specific areas for research.
In 2013 a presidential policy directive emphasized that research was a critical
aspect of achieving critical infrastructure security and resilience27
but was not specific. In
26
Verizon, 2016 DBIR, p. 11, fig. 9.
27
Resilience is the ability to operate at an acceptable, if suboptimal, level of performance in the face of
attack or failure. For a thoughtful exploration of this concept, see Harriet Goldman, “Building Secure,
Resilient Architectures for Cyber Mission Assurance,” Case 10-3301, MITRE Corp., 2010, at
https://pdfs.semanticscholar.org/911a/9c301359a0bcbdc3e49b2f7a04cf7eef14b2.pdf, accessed
January 5, 2017.
25. MIT Center for International Studies 25 MIT Internet Policy Research Initiative
June 2014, a subcommittee of the NSTC issued a cogent statement of federal
cybersecurity research objectives, but did not identify a path to get there. Last year DHS
brought additional attention to the challenge with its R&D plan for research in this area,
but the plan did not go beyond a general statement of objectives. Reports and directives
from high levels of government are inevitably general, but lack of follow-through and
inattention to detail are not inevitable. At the agency level, specific but uncoordinated
research projects are underway to tackle technical cybersecurity problems. For example,
at the Defense Advanced Research Project Agency (DARPA) a project on Organically
Assured and Survivable Information Systems (OASIS) focuses on increasing fault tolerance
in systems and networks. But these programs are not coordinated, and many of the
general problems described in high-level government documents remain insufficiently
addressed, if addressed at all.
Against this background, the nation must devote substantial coordinated
resources (1) to identify the most salient risks to critical infrastructure networks, and (2)
to describe specific cybersecurity objectives that could reduce those risks and that could
be broken into manageable research projects. This is what IPRI and CIS have sought to do.
The Workshop Plan
IPRI and CIS convened four sector-specific workshops to study the challenge of a
coordinated research and policy plan, and later a fifth workshop to distill what we learned
from the first four. It was clear from the start that “critical infrastructure” had become too
broad a rubric to guide our work. In the United States, the term means “systems and
assets, whether physical or virtual, so vital to the United States that the incapacity or
destruction of such systems and assets would have a debilitating impact on security,
national economic security, national public health or safety, or any combination of those
matters.”28
Sixteen sectors have now been designated “critical.” We therefore selected four
sectors we deemed most critical,29
and scheduled the following day-long workshops, all
held in Cambridge, Massachusetts at MIT:
● Electricity October 8, 2015
● Finance November 5, 2015
● Communications December 3, 2015
● Oil and Natural Gas (ONG) February 8, 2016
● Final Workshop May 2, 2016
28
42 U.S.C. § 5195c (e).
29
Time constraints precluded an additional workshop on the transportation sector.
26. MIT Center for International Studies 26 MIT Internet Policy Research Initiative
Participants came from key industry firms in the United States, Canada, Japan, and
Europe; from pertinent government offices, from MIT, and from Carnegie-Mellon
University. Most of the MIT participants and several of the industry and government
participants attended all the workshops. We limited attendance to twenty people at each
workshop and did not ask for prepared presentations. Instead we asked participants to do
three things:
1. Describe their most severe challenges in terms of systemic issues;
2. Describe the characteristics of a more secure environment for IT and the OT linked
to it; and
3. Identify the technical, political, and economic impediments to achieving those
characteristics.
Each workshop took on a dynamic of its own. We asked questions but did not limit
the topics of discussion. Not surprisingly, some industry participants had difficulty framing
questions in strategic terms, while some academic participants had difficulty framing
theoretical questions that were relevant to the concerns of the industry participants. Yet
each workshop produced spontaneous, lively discussions that served to frame and
sharpen issues. Although we asked participants to address the three questions just stated,
the output of each workshop fell into a simpler dyad: a consensus list of the greatest risks
to the sector, and a consensus list of most important challenges for the sector. Except for
certain regulatory issues, every major challenge was discussed in every workshop. If a
challenge appears in the account of one workshop but not another, that is because it
received the most emphasis in that workshop.
To create a research agenda, we convened a fifth workshop of twenty participants
selected from the previous workshops and presented them with a distillation of ideas
from the previous sessions. We asked them to identify the most critical challenges across
all sectors and to turn those challenges into questions amenable to research. The
outcome of that workshop formed the basis of the IRPI-CIS statement of the seven high-
level challenges and the related recommendations and research questions in this report.
27. MIT Center for International Studies 27 MIT Internet Policy Research Initiative
The Sector-Specific Workshops
1. Electricity Sector Workshop
Electricity sits at the base of any modern society’s operational structure. Nearly all
economic and social activity depends on it. Not surprisingly, the risk most feared in this
workshop, even more than loss of information, was disruption of service.
The electricity sector operates in a unique and complex regulatory environment
and displays striking internal differences, especially between the larger firms and the
smaller enterprises and cooperatives. Electricity transmission in the United States30
is
governed by federal law, but delivery is regulated by the fifty states and the territories in
inconsistent ways. As a general matter, regulated entities are entitled to a specified rate
of return on expenditures allowed into their rate base, as determined by their regulator.
They therefore have an incentive to make expenditures allowable into that base.
According to our industry participants, state regulation has historically been consistent in
its emphasis on rate regulation, which is a politically sensitive topic, and on safety.
Expenditures calculated to lower rates (such as software designed to create efficiencies)
or to improve safety are favored, they said. In contrast, network security has not been a
regulatory focus, and some participants asserted that capital expenditures necessary to
defend digital systems are more difficult candidates for regulatory approval. Because of
the asserted difficulty of assigning a return on investments in network security, such
expenditures were also more difficult candidates for corporate approval, according to
these participants. These statements should be verified because, if true, these factors,
together with the long lifespan of much of the sector’s OT, would impede the adoption of
needed security measures.
The Most Severe Risks
Risk 1: Risk from aging operating systems retrofitted with digital controls.
Most participants believed the most important risk factor for their sector was the
networking of aging valves, pumps, and other hardware that were designed to be
physically isolated and locked up, but which are now accessible remotely. Many of these
operating components were twenty or more years old. They now form parts of systems
that were retrofitted (“cobbled together”) to be electronically accessible through
acquisition programs that failed to take the resulting vulnerabilities into account. A
participant compared the state of the industry to the Office of Personnel Management,
which had digitized old systems without understanding the vulnerabilities thus created.
30
The U.S. electric grid is better described as being part of the North American electric grid. There are
many dependencies at the grid level between the U.S. and Canada.
28. MIT Center for International Studies 28 MIT Internet Policy Research Initiative
Participants also stated that no one fully understood the extent to which the
electricity industry is tightly coupled with other sectors, and therefore did not sufficiently
understand the risk of catastrophic, macroeconomic failure. There was support for the
view that the Department of Energy should be more concerned about disruptions lasting
longer than two to three weeks.
Risk 2: Risk from third-party access.
One participant identified his company’s chief risk as unauthorized external access
to networks and systems owing to the extension of access privileges to third parties,
mostly vendors and other contractors. All agreed this was a significant risk factor. Some
doubted whether meaningful network perimeters still exist. In some cases, companies
required dual-factor identification and the use of a VPN to engage in remote
maintenance, but if the threat arose in a trusted vendor’s system, as some thought likely,
those steps did not help.
Data centers and the increasingly ubiquitous Internet of Things (“IoT”) also created
third-party risk. The IoT created an attack surface that was huge and expanding
dramatically, and many of the connected devices related to energy consumption and had
little or no security designed into them. If attacked, these devices could cause localized
failure and be used to steal customer information. They could also be organized into
botnets to attack any sector of the economy. That observation has since been borne
out.31
Risk 3: Risk Created by Regulatory Emphasis on Compliance versus Security.
Participants stated there was a confusion among many executives and regulators
about the difference between compliance with published standards and adequate
security. That confusion is not restricted to this sector. In contrast, no such confusion
exists among security professionals, who understand that compliance certifications are a
necessary condition of doing business but insufficient because they do not adequately
address constantly changing risks. Some participants also stated that the basic compliance
standard issued by the North American Electric Reliability Corporation, known as the
“NERC CIP,” compared unfavorably to standards issued by the Payment Card Industry.
Compliance is check-list oriented and gives a false impression of security. Participants also
emphasized cultural factors, noting that the oil-and-gas sector’s concerted emphasis on
physical safety may be a model for an emphasis on security.
31
David E. Sanger and Nicole Perlroth, “A New Era of Internet Attacks Powered by Everyday Devices ,”
New York Times, October 22, 2016, at http://www.nytimes.com/2016/10/23/us/politics/a-new-era-of-
internet-attacks-powered-by-everyday-devices.html?_r=0, accessed October 25, 2016.
29. MIT Center for International Studies 29 MIT Internet Policy Research Initiative
The Challenges
The electricity workshop identified high-level security objectives supported, in
most cases, by more detailed objectives necessary to achieve them. Most of the identified
challenges were economic, commercial, and legal rather than technical. In nearly all cases,
however, meeting the objectives would require a substantial effort simply to gather the
data necessary for high-quality analytics. Obtaining the necessary data in ways that did
not create additional risk for the data provider would itself be a significant challenge.
Challenge 1: Quantifying risk at the enterprise, sectoral, and macroeconomic levels.
There was general agreement that quantifying risk was both difficult and
necessary. As one participant stated, a dollar spent on “vegetation management”
(trimming trees) was more valuable to his company’s board than a dollar spent on
cybersecurity, because its effect could be measured, whereas network risk could not.
Participants also stated that baselining risk – that is, describing the current state of a
network – was difficult but necessary to quantify risk. One participant stated that many
utilities do not even own their own data, which would be required for risk analysis,
intelligence gathering,32 and prediction.
Challenge 2: Measuring and reducing intra-sector and cross-sector fragilities through
simulation-based, cross-sector exercises.
These fragilities were insufficiently understood. There are about 3000 utilities in
the United States, but seven utility holding companies serve about 70% of U.S.
customers.33 The level of operating and security sophistication in the market was not
uniform. More attention should be paid to IT/OT inter-connection risk across this
disparate market and to coordinating defenses. There was general agreement that the
electricity sector lagged the financial sector in this regard, and that sectors were tightly
coupled. Participants did not believe the country could detect a series of rolling, low-level
events that could precipitate a crisis. Participants broke this challenge into three parts:
a. Compile the data required for quality simulations. Exercises between the electric
and the financial sectors could yield major security gains, participants believed.
Various exercises coordinated by the Treasury Department and the Financial
32
The U.S. Department of Energy (DoE) has spearheaded an effort called the Cybersecurity Risk
Information Sharing Program, or CRISP, to share classified as well as unclassified information in this
sector. See letter of Patricia Hoffman, Assistant Secretary, DoE Office of Electricity Delivery and Energy
Reliability to Tom Fanning and Fred Gorbet, August 5, 2014, at
http://www.nerc.com/pa/CI/Resources/Documents/Department%20of%20Energy%20Letter%20-
%20Cybersecurity%20Risk%20Information%20Sharing%20Program%20(CRISP).pdf, accessed January 6,
2017.
33
Information courtesy of the Edison Electric Institute.
30. MIT Center for International Studies 30 MIT Internet Policy Research Initiative
Services Sector Coordinating Council were a good model.34
But simulations
require large quantities of good data, which firms have been reluctant to share.
Utilities measure success based on reliability, safety, low costs, and consumer
satisfaction. What data would induce companies to add network security to this
list?35
b. Secure the participation of state, local, and federal governments in cross-sector
simulation exercises. A series of disaster exercises called Gridex now exists, but it
is limited to public-sector stakeholders. In the next scheduled exercises, planned
for the autumn of 2017, “participation is open only to registered utilities and
others specifically invited by the utility (e.g., vendors, local law enforcement).”36
Additional exercises should broaden participation in the public and private
sectors.
c. In a collaboration between MIT and industry, develop realistic scenarios for
simulation exercises.
Challenge 3: Creating a model for a rational regulatory scheme that would align
investment and security requirements with risk.
Many participants stated that prevailing regulatory regimes create intense
pressure to adopt software technology without any pressure to secure it. The following
specific steps toward creating a better model were proposed:
a. Perform a comparative analysis of state regulation of electric utilities in
Massachusetts, Rhode Island, and New York. An industry participant with
experience in these jurisdictions stated that studying their differences would be
enlightening.
b. Compare data integrity measures in the electric and financial sectors. The
financial sector was said to be intensely concerned with data integrity and was
more advanced than this sector in securing it.
34
See, e.g., Sean Waterman, “Bank regulators briefed on Treasury-led cyber drill,” FedScoop, July 20,
2016, at http://fedscoop.com/us-treasury-cybersecurity-drill-july-2016, accessed November 8, 2016;
U.S. Department of Treasury, “Joint Statement from the U.S. Department of The Treasury and Her
Majesty’s Treasury,” November 12, 2015, at https://www.treasury.gov/press-center/press-
releases/Pages/jl0262.aspx, accessed November 8, 2016.
35
A participant noted that the automobile industry had created massive cyber vulnerabilities in
vehicles, but that the industry is fixing them now because the potential liabilities could be very large.
Regulated utilities were said not to face a comparable risk.
36
NERC, “GRIDEX IV Frequently Asked Questions,” p. 1, December 2, 2016, available at
http://www.nerc.com/pa/CI/CIPOutreach/Pages/GridEX.aspx, accessed January 5, 2017.
31. MIT Center for International Studies 31 MIT Internet Policy Research Initiative
c. Study nuclear regulation as a potential model for the regulation of non-nuclear
electricity. A participant stated that the nuclear industry went from a prescriptive
to a performance-based regulatory regime, recognizing that technologies were
advancing more quickly than regulation could keep up.
d. Optimize legal, regulatory, and tax, policy for security investment to maximize
investment incentives and place costs where they can be reflected in the price
of the goods and services produced. Existing regulatory schemes and tax policy
did not do this, according to participants. There was broad but not unanimous
support for the view that liability should play a greater role in driving better
network security, and that now it plays almost none.
Challenge 4: Supporting a market for simpler, less vulnerable technology.
The widespread use of field-programmable gate arrays37
and multi-purpose
controls were cases in point. Both were cheaper to produce than special-purpose devices
and were highly capable – but were therefore more vulnerable. Creating a market for
limited-purpose devices was seen as more of a political and economic challenge than a
technical one. In this regard, some participants wanted to explore the use of analog
devices within, or alongside digital systems, especially at end points.
Challenge 5: Improving human expertise in network management.
a. Identify the skill sets uniquely required in this sector and expand the talent
pool. There are not enough qualified operating engineers and computer
scientists who understand the challenges unique to the electricity sector.
b. Investigate the “Rickover Model” for the training and selection of navy
personnel for the nuclear submarine service. When the U.S. Navy created a
nuclear submarine service, Admiral Hyman Rickover required applicants to
complete a rigorous training regimen for admission to the service. Could that
model be adapted for security professionals in this or other sectors?
37
“A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a
customer or a designer after manufacturing …. FPGAs contain an array of programmable logic blocks,
and a hierarchy of reconfigurable interconnects that allow the blocks to be "wired together", like many
logic gates that can be inter-wired in different configurations.” “Field-programmable Gate Arrays,”
Wikipedia, at https://en.wikipedia.org/wiki/Field-programmable_gate_array, accessed December 12,
2016.
32. MIT Center for International Studies 32 MIT Internet Policy Research Initiative
Challenge 6: Integrating the Management of IT and OT.
Each utility is different in the way it integrates, or fails to integrate, the
management of operating technology (OT) and information technology (IT). Some do not
converge until the corporate level; others converge much lower down. No one believed a
single governance model would be useful, but the group did believe that IT and OT have
substantially converged – at any rate, they have converged sufficiently so that operating
systems can now be attacked through IT systems. Management structures should reflect
that fact.
a. Unify security functions. In the view of many participants, someone in the
enterprise should have a view of the full scope of security threat, from wherever
they came. The group did not agree on that person’s proper title and reporting
responsibilities, but did agree that he or she should report to an officer of the
company and possibly to the board.
b. Optimize OT/IT replacement cycles, which are out of synch. OT in this sector
has historically been on replacement cycles of 15-25 years. In contrast, IT
measures technology generations in 3-5 years. These cycles should be studied
and optimized.
33. MIT Center for International Studies 33 MIT Internet Policy Research Initiative
2. Financial Sector Workshop
The finance workshop identified three risks that were unique or especially severe
in the sector:
1. Data integrity risk;
2. Systemic risk to the financial system that may not be apparent when
considering enterprises or the sector in isolation; and
3. Third-party risk arising from the inability to alter long-term contractual
arrangements with other market participants.
The financial sector also shares risks common to critical infrastructure, though it
has the most advanced network defenses of any sector.
The Most Severe Risks
Risk 1: Data Integrity.
Risk to the integrity of financial data topped the list of our participants’ concerns.
Our economy is based on a system of accounts recording who owes what to whom at any
moment. Those accounts are digitized, and so are back-up systems. An attack that
destroyed or corrupted the accounts of a major financial institution could wreak
devastating economic havoc unless those accounts could be quickly and reliably
reconstituted. The risk extends beyond banks to securities exchanges, brokerage firms,
investment companies, clearing organizations, and other financial enterprises.
A sophisticated network attack could lock-up this sector. A logic bomb, for
example, could randomly delete system files. According to one participant, that has
already occurred, and it took time to understand what had happened and to fix it. But
disruption is only one risk that could arise form from data loss or corruption. A subtle,
more limited operation that corrupted the pricing of selected securities, for example,
could be used to manipulate markets, create illegal profits and losses, and drive parties
out of business.
Participants agreed that a slowly rolling attack on an institution might create more
havoc than an attack that brought the institution to an immediate halt, for which the
larger institutions prepare. A “low and slow” corruption of accounts would be difficult to
spot, and unless it were stopped quickly, it would infect back-up systems, too. The longer
it lasted, the more backup accounts would also be infected. Research that addressed this
risk would be of great value.
34. MIT Center for International Studies 34 MIT Internet Policy Research Initiative
Risk 2: Systemic Risk from Tight Coupling Within and Across Sectors.
Participants were concerned about the cross-sector risk created by the tight
coupling of finance, energy, and telecommunications, but they were also concerned about
risk from tight coupling within their sector. Several participants agreed that financial
enterprises assume that in this space all parties are managing their own risks and that
systemic risk is therefore also being managed through the sector, but they doubted this is
true. Notwithstanding the perception that the level of cooperation in this sector is high,
these participants believed it was insufficient and that more collective action on
information sharing would be required to better protect the sector from attack. The
nuclear power industry was cited as an example. In that sector there was widespread
understanding that an adverse incident that affected any of them would adversely affect
them all. The financial sector was said not to be at that point.
In particular, several participants complained of poor network security among
competing institutions (“shirking”). They gave two examples: (1) competitors that sought
market advantage by saving money on network security, and (2) community banks that
lacked the financial and other resources to make themselves reasonably secure. As to the
latter, participants noted that the share of assets controlled by community banks
continues to fall, so some questioned the significance of this risk. Others noted that
imposing further regulation on these banks would accelerate consolidation in the banking
sector. However, that risk was not equally troubling to everyone present. A participant
noted that shirking was merely one aspect of the more general problem of consistent
standards. As institutions other than banks and SEC-regulated businesses became larger
players, the problem of inconsistent regulation would present a growing problem. Several
participants stressed that one should pay close attention to the application of regulatory
standards as well as to their content when assessing consistency.
Risk 3: Contractual Risk from Long-Term Third-Party Contracts.
Long-term contracts with other institutions (which some participants called
“locked handshakes”) were a special example of risky intra-sector coupling. The example
given involved payment processors, which allegedly employ hard, pre-set passwords that
are not regularly rotated, if rotated at all. That kind of arrangement was said to lock in
network access rights of third-parties with allegedly poor security. These contracts were
said to allocate risk in ways that participants believed were unfair and that were not
foreseen when the contracts were made. These contracts can have terms of twenty years,
and many were made before the sector fully came to grips with network risk. These
assertions should be tested empirically. However, industry participants believed this risk
was real, that the sector needed a means to force the renegotiation of these contracts,
and that quantifying the problem would be helpful. We detected a willingness among
several industry participants to favor a regulatory solution to this issue, and one of them
specifically suggested that the issue could be of interest to the Federal Trade Commission
35. MIT Center for International Studies 35 MIT Internet Policy Research Initiative
(which has recently used Section 5 of the FTC Act38
to address unfair as well as misleading
practices affecting network security). Another suggested that clearing agencies might be
able to provide leverage for achieving higher security levels. In evaluating these
contentions, attention must be paid to the competitive interests involved as well as to the
alleged security risks.
Risk 4: Difficulty of Identifying Malicious Actors.
The difficulty of attributing behavior to malicious actors is an aspect of the identity
management problem common to every sector, but our participants stressed the
challenge of ascertaining internal as opposed to external identities. And they were
concerned with controlling administrative privileges because most hacks they dealt with
involved abuse of administrator access. Some participants said that machines also have
identities and privileges, and that managing identities was easier for people than for
machines. Several participants stated, without dissent, that “operator risk” – that is,
insider threat from malicious or simply negligent behavior – was a medium, not a low,
probability. Some participants agreed that the government’s unsuccessful efforts
regarding trusted identities illustrated the difficulty of accomplishing anything
comprehensive in this space.
The Challenges
Challenge 1: Enhancing the integrity of backup systems.
A slowly evolving attack could be a bigger threat to financial institutions than an
attack aimed at a sudden network collapse because it would not be discovered as quickly
– and possibly not until backup systems had been infected. Participants were particularly
interested in the possible applicability of blockchain technology to their systems and the
status of blockchain research to the latency problem (that is, the time required to
complete a communication or transaction). Some participant firms are investing in
blockchain research.
38
15 U.S.C. §§ 41-58, as amended. The Commission is a consumer protection agency, not a financial
regulator. It considers three factors in determining whether a practice violates the prohibition on
unfair consumer practices: (1) whether the practice injures consumers; (2) whether it violates
established public policy; (3) whether it is unethical or unscrupulous.” FTC, “FTC Policy Statement on
Unfairness,” December 17, 1980, accessed November 16, 2016.
36. MIT Center for International Studies 36 MIT Internet Policy Research Initiative
Challenge 2: Identifying and reducing cross-sector risk through joint cross-sector
exercises.
Robust joint exercises using sophisticated data would help illuminate the risk from
the tight coupling of power, finance, and telecommunications. These exercises would
elucidate intra-sector and cross-sector vulnerabilities and would benefit all participating
sectors. They would also highlight sectoral differences about the priorities given to
availability, integrity, confidentiality – another area for potential research.
Challenge 3: Improving identity management consistent with privacy concerns.
a. Among Communicants
The tension between privacy and identity management among communicants
concerned many participants, but there was widespread agreement that it is
important to focus on the specific information fields that would be most useful,
and then to determine whether and how that data can be shared consistent with
EU and US law. Several participants asserted that EU law made it more difficult
to identify both malware and malicious actors in their systems.
A non-industry participant stated that banks and credit card companies are not
using in their own networks the kinds of data-driven identity management/risk
flagging techniques they employ to monitor credit risk. It would be useful to
know whether, why, and to what extent this may be true.
b. Among Providers
It is technically simple to divert large amounts of traffic when it is “handed off”
from one service provider to another. This has occurred several times. These
hand-offs occur at border gateways, following border gateway protocols (BGP).
These protocols are weak, which is to say that identity assurance39
is weak at the
BGP level as well as at the level of individual communications. Traffic diversion
could cripple communications, and although it would be quickly discovered and
repaired, the delay in a crisis could be critical. A more secure version of BGP
exists, called BGPSEC, but few U.S. carriers have adopted it, presumably because
they do not expect a benefit from adoption that would offset its cost. What
economic or other factors impede the adoption of border gateway protocols
that would make it impossible, or substantially more difficult, to divert network
traffic? How can those factors be reduced or eliminated? Fixing this systemic
weakness would not appear to raise privacy concerns.
39
Machines, systems, and regions of the Internet, as well as persons, have identities.
37. MIT Center for International Studies 37 MIT Internet Policy Research Initiative
Challenge 4: Containing the “Blast Radius” of Destructive Attacks.
It is now widely understood that malware cannot reliably be kept out of even very
sophisticated and well-run systems. The challenge was therefore to contain its effects – or
as one participant put it, to contain its “blast radius.” Participants returned several times
to this topic and were deeply interested in technical means of accomplishing this
objective (e.g., flexible segmentation and rapid reconstruction of networks).
Challenge 5: Modernizing the Regulatory Environment
Regulatory challenges fell into two groups: (i) creating flexible standards that
would improve security as well as guide compliance (a goal that may be as elusive in
theory as it has been in practice), and (ii) harmonizing regulations nationally and
internationally.
a. Flexible Standards
Industry participants stated that regulatory norms are not adapting to rapidly
changing technology and are rigid and costly without being effective. They noted
several instances where firms were compliant with applicable standards but were
penetrated anyway. They were interested in seeing flexible standards that would
evolve with technology and reduce risk when implemented – like a standard of
care. Participants referred to standards issued by the National Institute of
Standards and Technology (NIST) and the International Standards Organisation.40
These could evolve into enforceable standards of care, but legally binding
standards of care usually evolve through litigation; regulations are promulgated.
A non-industry participant stated that compliance and risk-based standards are
not necessarily in conflict, and that expecting government or a standards
organization to compel virtue was not realistic. He added that mandating red-
teaming forces threat-modeling. More broadly, he asked what success would look
like under a risk-based approach and suggested this could be a fruitful research
question. In this regard, participants would be interested to know whether
sectoral stress tests could be developed.
40
NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” v. 1.0, February 12, 2014, at
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf, accessed January 7, 2017; ISO/IEC 27032: 2012 Information Technology – Security
Techniques – Guidelines for Cybersecurity, July 2012, at
http://www.iso27001security.com/html/27032.html, accessed January 7, 2017.